Anuj Soni (@asoni) 's Twitter Profile
Anuj Soni

@asoni

Malware Reverse Engineer. Instructor & Author @SANSInstitute (FOR710, FOR610). Occasional YouTuber.

ID: 10434102

linkhttp://youtube.com/@sonianuj calendar_today21-11-2007 06:11:36

748 Tweet

3,3K Followers

354 Following

Victor M. Alvarez (@plusvic) 's Twitter Profile Photo

YARA-X is not only a pattern matching tool You can use it for extracting useful information from multiple file formats, including PE, .NET, ELF, Mach-O and LNK. virustotal.github.io/yara-x/blog/ya…

Anuj Soni (@asoni) 's Twitter Profile Photo

I loved speaking at BSides Philly last year for the first time. Highly recommend attending to anyone in the area 👍🏾!

Anuj Soni (@asoni) 's Twitter Profile Photo

Curious about FOR710? Check out the 'Course Demo' at sans.org/for710 for over an hour of content where I introduce binary emulation frameworks for malware analysis. You'll get a flavor of the automation-focused section and a preview of what the course has to offer. Got

Curious about FOR710? Check out the 'Course Demo' at sans.org/for710 for over an hour of content where I introduce binary emulation frameworks for malware analysis. You'll get a flavor of the automation-focused section and a preview of what the course has to offer. 

Got
Anuj Soni (@asoni) 's Twitter Profile Photo

Huge thanks to Jiří Vinopal for his ConfuserEx2 deobfuscation tools—worked flawlessly on a recent sample! 🔥 Check out his detailed walkthrough: youtu.be/y_ma9cLFdmY?si… and the tools: github.com/Dump-GUY/Confu…

Willi Ballenthin (@williballenthin) 's Twitter Profile Photo

capa v7.3 out! Recently we’ve added: - Drakvuf and VMRay sandbox support - web interfaces for results, rules, and homepage - BinExport2 backend that enables aarch64 and Android analysis via Ghidra - …and of course lots of new rules github.com/mandiant/capa/…

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤩 I’m honored to announce that I’ve been nominated for the SANS Institute Difference Maker award in the category "Practitioner of the Year"! 🎉 If you’ve liked my work, you can cast your vote here 👇Thanks a lot for your support! 🙏 ❤️ #infosec survey.sans.org/jfe/form/SV_e3…

🤩 I’m honored to announce that I’ve been nominated for the <a href="/SANSInstitute/">SANS Institute</a> Difference Maker award in the category "Practitioner of the Year"! 🎉

If you’ve liked my work, you can cast your vote here 👇Thanks a lot for your support! 🙏 ❤️ #infosec

survey.sans.org/jfe/form/SV_e3…
Anuj Soni (@asoni) 's Twitter Profile Photo

🚨 UnitedHealthcare is hiring a Senior Malware Analyst! 🚨 If analyzing malware is your mission, apply now: careers.unitedhealthgroup.com/job/20783386/s… This is a remote role, but candidates must be located in the U.S. Not for you? Please retweet – this might be the opportunity one of your followers has been

🚨 <a href="/UHC/">UnitedHealthcare</a> is hiring a Senior Malware Analyst! 🚨
If analyzing malware is your mission, apply now: careers.unitedhealthgroup.com/job/20783386/s…
This is a remote role, but candidates must be located in the U.S.

Not for you? Please retweet – this might be the opportunity one of your followers has been
Anuj Soni (@asoni) 's Twitter Profile Photo

After far too long, I signed up to sponsor x64dbg! If you benefit from x64dbg like I do, consider supporting this essential tool: github.com/sponsors/mrexo…. And if x64dbg isn’t in your toolkit, think about supporting the tools that are. Free tools may be 'free', but they’re costly

Anuj Soni (@asoni) 's Twitter Profile Photo

One of my favorite videos from John Hammond, love the deep dive into a hashing algorithm with Binja and the step-by-step approach to implementing it in Python🔥

Anuj Soni (@asoni) 's Twitter Profile Photo

Launching a series on malicious shellcode analysis! In Part 1, I share an approach to manually extract shellcode from multi-stage malware, with help from x64dbg and Vector 35's Binary Ninja. 👉 Watch now: youtu.be/642VUEjMeLw Part 2 will explore automating shellcode

Launching a series on malicious shellcode analysis!

In Part 1, I share an approach to manually extract shellcode from multi-stage malware, with help from <a href="/x64dbg/">x64dbg</a> and <a href="/vector35/">Vector 35</a>'s Binary Ninja.

👉 Watch now: youtu.be/642VUEjMeLw

Part 2 will explore automating shellcode
Anuj Soni (@asoni) 's Twitter Profile Photo

Part 2 of my shellcode analysis series is here! This time, we’re automating shellcode extraction with one of hasherezade’s incredible open-source tools. 🎥 Watch now: youtu.be/D6Bm5vD78eY

Part 2 of my shellcode analysis series is here!

This time, we’re automating shellcode extraction with one of <a href="/hasherezade/">hasherezade</a>’s incredible open-source tools.

🎥 Watch now: youtu.be/D6Bm5vD78eY